Patents by Inventor Howard Jeffrey Locker

Howard Jeffrey Locker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20030070079
    Abstract: A method and system for authentication in a computer system is disclosed. The method and system of the present invention includes registering a biometric template in the computer system, thereafter, verifying the authenticity of the registered biometric template and then comparing the biometric template with a biometric image of the user if the biometric template is authentic. If the user's biometric image matches the biometric template, the computer system will continue to boot.
    Type: Application
    Filed: October 4, 2001
    Publication date: April 10, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Joshua James Jankowsky, Howard Jeffrey Locker, Andy Lloyd Trotte, James Peter Ward
  • Publication number: 20030069999
    Abstract: The hard disk drive of a computer system is loaded with a preloaded image including an operating system, a number of application programs, and a device driver installation routine, all of which are not dependent on the hardware configuration of the computer system. A hidden partition of the hard disk drive is also loaded with a number of device drivers, which are dependent upon the hardware configuration. During the first boot only of the preloaded image, the device drivers are installed by the device driver installation routine.
    Type: Application
    Filed: October 4, 2001
    Publication date: April 10, 2003
    Applicant: International Business Machines Corporation
    Inventors: Richard Wayne Cheston, Daryl Carvis Cromer, Jeffrey Mark Estroff, James Anthony Hunt, Howard Jeffrey Locker, Joshua Neil Novak, Randall Scott Springfield, James Peter Ward, Arnold Stephen Weksler
  • Publication number: 20030055846
    Abstract: A method and system for providing field replaceable units (FRU's) to a personal computer being repaired of updated. A software agent, installed on the personal computer, collects identification information about all FRU's in the personal computer. The collected identification information is stored in a memory register in the personal computer on a scheduled periodic basis, and then transmitted to and stored on a remote service computer. A field service technician, upon receipt of a repair request for the personal computer, retrieves the identification information from the remote service computer identifying all FRU's for the uniquely identified personal computer. The technician then brings all FRU's used by the personal computer to the field repair site so that the needed FRU is readily available, thus avoiding multiple trips that would be required to first visually inspect the components of the personal computer and then return with the needed FRU's.
    Type: Application
    Filed: September 20, 2001
    Publication date: March 20, 2003
    Applicant: International Business Machines Corporation
    Inventors: Richard Wayne Cheston, Daryl Carvis Cromer, Howard Jeffrey Locker, David Rhoades, James Peter Ward
  • Publication number: 20030046156
    Abstract: A computer-implemented method determines which products are to be advertised as specials on web pages or in another form of advertisement, based on comparing scores generated for each product within a number of products offered for sale to predict the profit potential of the product. Preferably, the score is generated by multiplying a profit factor, indicating a profit for each sale, by a sales factor, determining the likelihood of selling the product, and by an inventory factor, which is included to prevent the advertisement of a product for which an inadequate inventory is held as a special. Preferably, web pages are automatically generated at a predetermined time with products having the best scores being advertised as specials.
    Type: Application
    Filed: August 30, 2001
    Publication date: March 6, 2003
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Howard Jeffrey Locker, James Peter Ward
  • Publication number: 20030028765
    Abstract: Data stored on a computer readable medium in a computing system is protected from being read within another computing system by encrypting a data structure, such as the FAT table of a disk recorded using a FAT-based file system or a portion of the master file table of a disk recorded using an NTFS file system. This data structure is used to find the files on the medium. Encryption and decryption preferably occur within a cryptographic processor of the computing system, with this data structure in a hard drive being encrypted as the computing system is shut down and decrypted after power on. In an alternate embodiment, a utility program provides for selective encryption and decryption of a data structure in a removable computer readable medium.
    Type: Application
    Filed: July 31, 2001
    Publication date: February 6, 2003
    Inventors: Daryl Carvis Cromer, Brandon Jon Ellison, Howard Jeffrey Locker, Randall Scott Springfield, James Peter Ward
  • Publication number: 20030014508
    Abstract: A method and system for providing automatic notification of an end of lease of a computer system and its location within a computer network is disclosed. The computer network includes a server computer system and multiple client computer systems. A message is initially sent from the server computer system to all the client computer systems to inquire the lease status of each of the client computer systems. At each of the client computer systems, a determination is made as to whether or not a current date falls within a predetermined amount of days from the end of lease date for the client computer system. If the current date falls within the predetermined amount of days from the end of lease date for the client computer system, the physical location of the client computer system is obtained from a storage device located at an Ethernet wall plate to which the client computer system is attached.
    Type: Application
    Filed: July 16, 2001
    Publication date: January 16, 2003
    Applicant: International Business Machines Corporation
    Inventors: Richard Wayne Cheston, Daryl Carvis Cromer, Howard Jeffrey Locker, James Peter Ward
  • Publication number: 20020158967
    Abstract: The display of a notebook computer includes a privacy filter extending over the display screen to limit the viewing angle within which the image on the screen can be discerned. To allow for normal viewing when the privacy feature is not required, the privacy filter is movable from the screen by sliding into a cavity extending from one side of the screen to be rolled onto a roller or to be stored partly behind the screen. Alternately, a privacy filter is provided that is electrically switchable between a mode in which the viewing angle is limited and a mode in which normal viewing is permitted. The movable privacy filter includes closely spaced louvers surrounded by clear plastic or, alternately, a polarizer. The switchable privacy filter includes a liquid crystal device and a polarizer.
    Type: Application
    Filed: April 27, 2001
    Publication date: October 31, 2002
    Applicant: International Business Machines Corporation
    Inventors: Jan Michael Janick, Howard Jeffrey Locker, Russell Alan Resnick
  • Publication number: 20020161938
    Abstract: Aspects for increasing control information from a single general purpose input/output (GPIO) mechanism are described. The aspects include establishing a plurality of voltage levels to indicate a plurality of states for association with installed options on a computer system planar. Further included is the determination of which of the installed options is present via the single GPIO.
    Type: Application
    Filed: April 27, 2001
    Publication date: October 31, 2002
    Applicant: International Business Machine Corporation
    Inventors: Ralph Bonomo, Daryl Carvis Cromer, Howard Jeffrey Locker, Joseph Michael Pennisi, James Peter Ward
  • Publication number: 20020159611
    Abstract: A method and system for reconfiguring a multi-dimension sound system is disclosed. The method and system include a remote control that is capable of emitting a low-frequency sound wave pulse pattern, and a plurality of speakers, wherein each speaker includes a pulse counter that counts a number of sound wave pulses received from the remote control over a predetermined time period. The method and system further include an audio receiver that includes a digital audio encoding system. The receiver uses the respective sound wave pulse count from each of the speakers to compute the distance between the remote control and each speaker, and programs the digital audio encoding system with speaker delay times based on the computed distances.
    Type: Application
    Filed: April 27, 2001
    Publication date: October 31, 2002
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Jan Michael Janick, Howard Jeffrey Locker, James Peter Ward
  • Publication number: 20020161998
    Abstract: A client lacking hardware-based cryptography functionality obtains its benefits by allowing an access server (or similar server through which the client consistently transmits data transactions) which has such hardware-based cryptography functionality to act as a virtual client. A connection having packet-level encryption is employed to transmit data transaction requests, and optionally also encryption keys, digital certificates and the like assigned to the client, from the client to the server, and to transmit processed responses from the server to the client. The server performs any required security processing required for data transaction requests and responses, such as encryption/decryption or attachment or validation of digital certificates, on behalf of the client utilizing the hardware-based cryptography functionality, then forwards processed requests to recipients and returns processed responses to the client via the secure connection.
    Type: Application
    Filed: April 27, 2001
    Publication date: October 31, 2002
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Publication number: 20020129261
    Abstract: A number of client systems receive a common secure transfer key pair from a server during initialization. The secure transfer private key is encrypted in the server with a platform public key sent to the server from the client system. Each client system is then able to encrypt data, using a secure transfer public key, to be recorded on a computer readable medium, and subsequently to decrypt such data using a secure transfer private key. Preferably, each client system includes an embedded security subsystem (ESS) performing cryptographic processes and providing secure key storage. Then, the secure transfer private key is stored as encrypted, and is decrypted using a private key within the ESS. Preferably, the platform private key is also stored encrypted, to be decrypted within the ESS using a hardware private key.
    Type: Application
    Filed: March 8, 2001
    Publication date: September 12, 2002
    Inventors: Daryl Carvis Cromer, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Publication number: 20020099934
    Abstract: A method and system are disclosed for dynamically loading selected BIOS modules and settings from a server computer system to a client computer system according to an identity of a user who is currently utilizing the client computer system. The client computer system is coupled to a server computer system via a network. Selected BIOS modules and settings are associated with a particular user. These BIOS modules and settings are those preferred by the particular user to use in order to customize the client computer system when the client computer system is used by the particular user. The associations among the particular user and the selected BIOS modules and settings are stored in the server computer system. The selected BIOS modules and settings are downloaded from the server computer system to the client computer system when the particular user causes the client computer system to start booting, i.e. when the particular user is the current user.
    Type: Application
    Filed: January 23, 2001
    Publication date: July 25, 2002
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Eric Richard Kern, Howard Jeffrey Locker, David Rhoades, James Peter Ward
  • Publication number: 20020093567
    Abstract: A method and system are disclosed for generating and distributing a digital photographic proof. An altered image is generated by altering original image data to produce altered image data. The altered image data is stored in an electronic file. The encrypted instructions are stored in the file with the altered image data. The instructions describe a method for reversing an alteration method utilized to alter the original image to produce the altered image data. A digital photographic proof is produced utilizing the file by displaying the altered image. All users are permitted to view the altered image. Only authorized users are permitted to utilize the encrypted instructions to reproduce the original image from the altered image data. Only authorized users may reproduce the original image. The single electronic file is thus utilized to both produce a digital photographic proof and to reproduce the original image.
    Type: Application
    Filed: January 12, 2001
    Publication date: July 18, 2002
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, David Carroll Challener, Richard Alan Dayan, Dhruv Manmohandas Desai, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Publication number: 20020093573
    Abstract: A digital camera and method are disclosed for verifying that a particular digitized visual image was produced by the digital camera. A visual image is stored in a digital format in the camera. A digital signature is generated for the image utilizing the camera only in response to the storage of the image in the particular camera which captured the image. The digital signature associates the stored image with the camera. The digital signature is stored only in the camera separately from the image in the camera. The digital signature is capable of being utilized only within the camera which generated the signature. It is not accessible outside of the particular camera which generated the signature. The signature is inaccessible to devices other than the camera. Subsequently, a digital visual image may be authenticated as being produced by this digital camera utilizing the digital signature stored in the digital camera.
    Type: Application
    Filed: January 12, 2001
    Publication date: July 18, 2002
    Applicant: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Publication number: 20020083323
    Abstract: A method and system for enabling an image to be authenticated is disclosed. The method and system comprise providing a digital signature associated with a device, allowing a user to capture the image utilizing the device and associating the digital signature and information related to the user with the captured image wherein the digital signature and the information related to the user are capable of being utilized to authenticate the captured image. Through the use of the method and system in accordance with the present invention, digital images can be captured whereby the digital signature of the capturing device, as well as information related to the photographer (i.e. name, company, etc.), are associated with the captured image. By associating the digital signature of the camera, as well as information related to the photographer, with the captured image, the subsequent authentication of the digital image is more reliable.
    Type: Application
    Filed: December 22, 2000
    Publication date: June 27, 2002
    Inventors: Daryl Carvis Cromer, Richard Alan Dayan, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Publication number: 20020080973
    Abstract: A computer system and method are disclosed for generating a certificate that can be validated against a trusted hardware subsystem within a computer system. A security subsystem is established within the computer system. A master key pair including a master public key and master private key are established. The master private key is stored in protected storage within the security subsystem such that the master private key is inaccessible outside of the security subsystem. Generation of a self-verifying certificate is requested. A user of the computer system is then prompted to enter an authentication code in response to the request for generation of the certificate. A certificate is generated utilizing the master key pair only in response to a correct entry of the authentication code. The certificate is used only internally within the computer system.
    Type: Application
    Filed: December 22, 2000
    Publication date: June 27, 2002
    Inventors: Daryl Carvis Cromer, Brandon Jon Ellison, Howard Jeffrey Locker, Andy Lloyd Trotter, James Peter Ward
  • Patent number: 6353854
    Abstract: A client on a network is provided with auxiliary low power logic, at the network adoptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, even when the system CPU is powered down, information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require a dialog with the user and/or limit maintenance and reconfiguration of the client system to off-hours activity.
    Type: Grant
    Filed: October 1, 1998
    Date of Patent: March 5, 2002
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Brandon John Ellison, Eric Richard Kern, Howard Jeffrey Locker, James Peter Ward
  • Patent number: 6330624
    Abstract: A data processing system and method are disclosed for protecting data stored on a device included within the system. A device key pair is established which identifies a particular device included within the system. The device key pair includes a device public key and a device private key. The device includes data stored on the device which may not be fully accessed initially. A planar key pair is established which identifies a planar board included within the system. The planar key pair includes a planar public key and a planar private key. The particular device is associated with the planar by storing the device public key only within the planar, and by storing the planar public key only within the device. Access to the data stored within the device is limited to only a planar which has the stored device public key.
    Type: Grant
    Filed: February 9, 1999
    Date of Patent: December 11, 2001
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Dhruv Manmohandas Desai, Howard Jeffrey Locker, James Peter Ward
  • Publication number: 20010027521
    Abstract: A client on a network is provided with auxiliary low power logic, at the network adaptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, even when the system CPU is powered down, information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require a dialog with the user and/or limit maintenance and reconfiguration of the client system to off-hours activity.
    Type: Application
    Filed: May 14, 2001
    Publication date: October 4, 2001
    Inventors: Daryl Carvis Cromer, Brandon John Ellison, Eric Richard Kern, Howard Jeffrey Locker, James Peter Ward
  • Patent number: 6249812
    Abstract: A client on a network is provided with auxiliary low power logic, at the network adaptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, irrespective of the system's CPU power level, information and provides for interaction between the user and the administration or network manager to exercise broader control and perform repair and upgrades which would otherwise require a dialog with the user and/or limit repair and reconfiguration of the client system to off-hours activity. The auxiliary logic also can receive and interpret commands from the network that conform to a predefined format.
    Type: Grant
    Filed: October 1, 1998
    Date of Patent: June 19, 2001
    Assignee: International Business Machines Corporation
    Inventors: Daryl Carvis Cromer, Gregory William Kilmer, Howard Jeffrey Locker, Randall Scott Springfield, James Peter Ward